Skip to main content

Shmoocon 2008

Various

DIFFERENT – ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues.  The first day is a single track of speed talks called One Track Mind.  The next two days bring three tracks:  Build It, Belay It, and Bring It On.


rss RSS

Show sorted alphabetically
Show sorted alphabetically
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Shmoocon 2008
movies
eye 357
favorite 0
comment 0
I Piss on Your AV shmoocon presentation 2008
Baked not Fried Performing an Unauthorized Phishing Awareness Exercise Syn Phishus
Shmoocon 2008
movies
eye 22
favorite 0
comment 0
Keynote Address Alex Halberman
Shmoocon 2008
movies
eye 24
favorite 0
comment 0
Bypassing AV in Windows Vista Mutts
Shmoocon 2008
movies
eye 30
favorite 0
comment 0
Bypassing Antivirus on Windows Vista muts
Advanced Protocol Fuzzing What We Learned when Bringing Layer2 Logic to SPIKE Land Enno Rey and Daniel Mende
Shmoocon 2008
movies
eye 22
favorite 0
comment 0
SIPing Your Network Radu State, Humberto Abdelnur, and Olivier Festor
Shmoocon 2008
movies
eye 29
favorite 0
comment 0
Got Citrix Hack It! Shanit Gupta
Shmoocon 2008
movies
eye 30
favorite 0
comment 0
Hacking Windows Vista Security Dan Griffin
Shmoocon 2008
movies
eye 17
favorite 0
comment 0
Malware Software Armoring Circumvention Danny Quist
Shmoocon 2008
movies
eye 27
favorite 0
comment 0
Forensic Image Analysis to Recover Passwords d Smith
Path X Explosive Security Testing Tools using XPath Andre Gironda, Marcin Wielgoszewski and Tom Stracener
Shmoocon 2008
movies
eye 28
favorite 0
comment 0
A Hacker Looks Past 50 G. Mark Hardy
Shmoocon 2008
movies
eye 38
favorite 0
comment 0
Smarter Password Cracking Matt Weir
Active 802.11 Fingerprinting Gibberish and Secret Handshakes to Know Your AP Sergey Bratus, Cory Cornelius and Daniel Pe
I Will Be Your Eyes and Hands Colossal Cave, Adventure and Reality Jason Scott
Shmoocon 2008
movies
eye 21
favorite 0
comment 0
Forced Internet Condom Aaron Higbee and Jaime Fuentes
Shmoocon 2008
movies
eye 22
favorite 0
comment 0
Why are Databases so Hard to Secure Sheeri Cabral
Flash Drives and Solid State Drives Data Recovery Compan to Hard Drives Animated Scott Moulton
Shmoocon 2008
movies
eye 17
favorite 0
comment 0
21st Century Shellcode for Solaris Tim Vidas
Shmoocon 2008
movies
eye 27
favorite 0
comment 0
TL1 Device Security
Shmoocon 2008
movies
eye 21
favorite 0
comment 0
TL1 Device Security Rachel Bicknell
Shmoocon 2008
movies
eye 19
favorite 0
comment 0
Passive Host Characterization Matthew Wollenweber
Shmoocon 2008
movies
eye 42
favorite 0
comment 0
Practical Hacker Crypto Simple Nomad
PEAP Pwned Extensible Authentication Protocol Josh Wright and Brad Antoniewicz
Shmoocon 2008
movies
eye 26
favorite 0
comment 0
Finding Bad Guys Can Be Fun
You Must Be This Tall to Ride the Security Ride Joel Wilbanks and Pete Caro
Shmoocon 2008
movies
eye 20
favorite 0
comment 0
Virtual Worlds Real Exploits Charlie Miller and Dino Dai Zovi
Shmoocon 2008
movies
eye 38
favorite 0
comment 0
Backtrack Demo
On the Social Responsbility of Hackers Panel Bruce Potter (moderator), Simple Nomad, Johnny Long, Rick Dakan
The Geek and the Gumshoe or Can Mathematics and Computers Really Solve Crimes Michael Schearer and Frank
Shmoocon 2008
movies
eye 17
favorite 0
comment 0
Vulncatcher Fun with Vtrace and Programmatic Debugging atlas
Shmoocon 2008
movies
eye 20
favorite 0
comment 0
0wn the Con The Shmoo Group
Shmoocon 2008
movies
eye 22
favorite 0
comment 0
Intercepting Mobile PhoneGSM Traffic H1kari
Shmoocon 2008
movies
eye 26
favorite 0
comment 0
Hacking the Samurai Spirit Isaac Mathis
They're Hacking Our Clients! Why are We Focusing Only on the Servers Jay Beale
Shmoocon 2008
movies
eye 17
favorite 0
comment 0
Legal Issues for Bot net Researchers and Mitigators Alexander Muentz
Web Portals Gateway to Information or a Hole in our Perimeter Defenses Deral Heiland
VoIP Penetration Testing Lessons Learned John Kindervag and Jason Ostrom
Shmoocon 2008
movies
eye 20
favorite 0
comment 0
How do I Pwn Thee Let Me Count the Ways RenderMan
Shmoocon 2008
movies
eye 33
favorite 0
comment 0
Malware Software Armoring Circumvention
When Lawyers Attack! Dealing with the New Rules of Electronic Discovery John Benson, Esq